General
-
Target
3a80eaccf0578865bab1e3b87b009d67031204fb0a6af19dcbc2d77e699735eeN.exe
-
Size
5.8MB
-
Sample
241220-de3deaxmex
-
MD5
507a010c585df7514045e91677c6c810
-
SHA1
cc75f96b70e36a17fbf267091cc3bedbd1f7ae60
-
SHA256
3a80eaccf0578865bab1e3b87b009d67031204fb0a6af19dcbc2d77e699735ee
-
SHA512
f836e75e17d4237d4ef4fed7a70db8cbf77eb89c988da014681b2b4f5050791badf5e53c0c1611bdfbe352edeba332f52342b3a264ab24472034926e9c7f3d09
-
SSDEEP
98304:NZAmLhPQY9/QORwljvKjq6P4YqN18frP3wbzWFimaI7dlo8f:N/LhPQYxQmwlTQNgbzWFimaI7dlr
Static task
static1
Behavioral task
behavioral1
Sample
3a80eaccf0578865bab1e3b87b009d67031204fb0a6af19dcbc2d77e699735eeN.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
3a80eaccf0578865bab1e3b87b009d67031204fb0a6af19dcbc2d77e699735eeN.exe
-
Size
5.8MB
-
MD5
507a010c585df7514045e91677c6c810
-
SHA1
cc75f96b70e36a17fbf267091cc3bedbd1f7ae60
-
SHA256
3a80eaccf0578865bab1e3b87b009d67031204fb0a6af19dcbc2d77e699735ee
-
SHA512
f836e75e17d4237d4ef4fed7a70db8cbf77eb89c988da014681b2b4f5050791badf5e53c0c1611bdfbe352edeba332f52342b3a264ab24472034926e9c7f3d09
-
SSDEEP
98304:NZAmLhPQY9/QORwljvKjq6P4YqN18frP3wbzWFimaI7dlo8f:N/LhPQYxQmwlTQNgbzWFimaI7dlr
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
A potential corporate email address has been identified in the URL: [email protected]
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1